Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:23
Static task
static1
Behavioral task
behavioral1
Sample
a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exe
Resource
win7-20230831-en
General
-
Target
a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exe
-
Size
1.0MB
-
MD5
6fbab6e5765c1ceba34480f29e6ac3a4
-
SHA1
e62ae24af48f3345f3beeefb05a0b5b6b04c4397
-
SHA256
a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37
-
SHA512
c48c6de6e63560cff58f19090eeb0ba682a02d8d315eadfedadaef306ffa06e3e093e27498bbf5ba08c6a38c4eab40698226399d67132c6c77bffce3bb6c743a
-
SSDEEP
24576:OyqK3ORHuA+LRPXbLHDjEPNzPZfjHdFU5YmEK603ilYQTaqBLCo:dL3fXjgPN7NpEYmEKAraqBLC
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2800-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2800-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2800-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2800-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1060-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t6628662.exeexplonde.exeu2990778.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation t6628662.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation u2990778.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 14 IoCs
Processes:
z1135380.exez7346986.exez6482031.exez6596204.exeq7453350.exer9114316.exes0022813.exet6628662.exeexplonde.exeu2990778.exelegota.exew9323570.exelegota.exeexplonde.exepid process 2344 z1135380.exe 5064 z7346986.exe 4608 z6482031.exe 4488 z6596204.exe 1816 q7453350.exe 2236 r9114316.exe 4720 s0022813.exe 4940 t6628662.exe 3808 explonde.exe 3068 u2990778.exe 4604 legota.exe 3508 w9323570.exe 1088 legota.exe 1996 explonde.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 5100 rundll32.exe 4680 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exez1135380.exez7346986.exez6482031.exez6596204.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1135380.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7346986.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z6482031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z6596204.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q7453350.exer9114316.exes0022813.exedescription pid process target process PID 1816 set thread context of 1060 1816 q7453350.exe AppLaunch.exe PID 2236 set thread context of 2800 2236 r9114316.exe AppLaunch.exe PID 4720 set thread context of 1248 4720 s0022813.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4968 1816 WerFault.exe q7453350.exe 2252 2236 WerFault.exe r9114316.exe 1724 2800 WerFault.exe AppLaunch.exe 1148 4720 WerFault.exe s0022813.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4280 schtasks.exe 2908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1060 AppLaunch.exe 1060 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1060 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exez1135380.exez7346986.exez6482031.exez6596204.exeq7453350.exer9114316.exes0022813.exet6628662.exeexplonde.exeu2990778.exedescription pid process target process PID 4912 wrote to memory of 2344 4912 a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exe z1135380.exe PID 4912 wrote to memory of 2344 4912 a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exe z1135380.exe PID 4912 wrote to memory of 2344 4912 a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exe z1135380.exe PID 2344 wrote to memory of 5064 2344 z1135380.exe z7346986.exe PID 2344 wrote to memory of 5064 2344 z1135380.exe z7346986.exe PID 2344 wrote to memory of 5064 2344 z1135380.exe z7346986.exe PID 5064 wrote to memory of 4608 5064 z7346986.exe z6482031.exe PID 5064 wrote to memory of 4608 5064 z7346986.exe z6482031.exe PID 5064 wrote to memory of 4608 5064 z7346986.exe z6482031.exe PID 4608 wrote to memory of 4488 4608 z6482031.exe z6596204.exe PID 4608 wrote to memory of 4488 4608 z6482031.exe z6596204.exe PID 4608 wrote to memory of 4488 4608 z6482031.exe z6596204.exe PID 4488 wrote to memory of 1816 4488 z6596204.exe q7453350.exe PID 4488 wrote to memory of 1816 4488 z6596204.exe q7453350.exe PID 4488 wrote to memory of 1816 4488 z6596204.exe q7453350.exe PID 1816 wrote to memory of 1060 1816 q7453350.exe AppLaunch.exe PID 1816 wrote to memory of 1060 1816 q7453350.exe AppLaunch.exe PID 1816 wrote to memory of 1060 1816 q7453350.exe AppLaunch.exe PID 1816 wrote to memory of 1060 1816 q7453350.exe AppLaunch.exe PID 1816 wrote to memory of 1060 1816 q7453350.exe AppLaunch.exe PID 1816 wrote to memory of 1060 1816 q7453350.exe AppLaunch.exe PID 1816 wrote to memory of 1060 1816 q7453350.exe AppLaunch.exe PID 1816 wrote to memory of 1060 1816 q7453350.exe AppLaunch.exe PID 4488 wrote to memory of 2236 4488 z6596204.exe r9114316.exe PID 4488 wrote to memory of 2236 4488 z6596204.exe r9114316.exe PID 4488 wrote to memory of 2236 4488 z6596204.exe r9114316.exe PID 2236 wrote to memory of 2800 2236 r9114316.exe AppLaunch.exe PID 2236 wrote to memory of 2800 2236 r9114316.exe AppLaunch.exe PID 2236 wrote to memory of 2800 2236 r9114316.exe AppLaunch.exe PID 2236 wrote to memory of 2800 2236 r9114316.exe AppLaunch.exe PID 2236 wrote to memory of 2800 2236 r9114316.exe AppLaunch.exe PID 2236 wrote to memory of 2800 2236 r9114316.exe AppLaunch.exe PID 2236 wrote to memory of 2800 2236 r9114316.exe AppLaunch.exe PID 2236 wrote to memory of 2800 2236 r9114316.exe AppLaunch.exe PID 2236 wrote to memory of 2800 2236 r9114316.exe AppLaunch.exe PID 2236 wrote to memory of 2800 2236 r9114316.exe AppLaunch.exe PID 4608 wrote to memory of 4720 4608 z6482031.exe s0022813.exe PID 4608 wrote to memory of 4720 4608 z6482031.exe s0022813.exe PID 4608 wrote to memory of 4720 4608 z6482031.exe s0022813.exe PID 4720 wrote to memory of 4064 4720 s0022813.exe AppLaunch.exe PID 4720 wrote to memory of 4064 4720 s0022813.exe AppLaunch.exe PID 4720 wrote to memory of 4064 4720 s0022813.exe AppLaunch.exe PID 4720 wrote to memory of 1248 4720 s0022813.exe AppLaunch.exe PID 4720 wrote to memory of 1248 4720 s0022813.exe AppLaunch.exe PID 4720 wrote to memory of 1248 4720 s0022813.exe AppLaunch.exe PID 4720 wrote to memory of 1248 4720 s0022813.exe AppLaunch.exe PID 4720 wrote to memory of 1248 4720 s0022813.exe AppLaunch.exe PID 4720 wrote to memory of 1248 4720 s0022813.exe AppLaunch.exe PID 4720 wrote to memory of 1248 4720 s0022813.exe AppLaunch.exe PID 4720 wrote to memory of 1248 4720 s0022813.exe AppLaunch.exe PID 5064 wrote to memory of 4940 5064 z7346986.exe t6628662.exe PID 5064 wrote to memory of 4940 5064 z7346986.exe t6628662.exe PID 5064 wrote to memory of 4940 5064 z7346986.exe t6628662.exe PID 4940 wrote to memory of 3808 4940 t6628662.exe explonde.exe PID 4940 wrote to memory of 3808 4940 t6628662.exe explonde.exe PID 4940 wrote to memory of 3808 4940 t6628662.exe explonde.exe PID 2344 wrote to memory of 3068 2344 z1135380.exe u2990778.exe PID 2344 wrote to memory of 3068 2344 z1135380.exe u2990778.exe PID 2344 wrote to memory of 3068 2344 z1135380.exe u2990778.exe PID 3808 wrote to memory of 4280 3808 explonde.exe schtasks.exe PID 3808 wrote to memory of 4280 3808 explonde.exe schtasks.exe PID 3808 wrote to memory of 4280 3808 explonde.exe schtasks.exe PID 3068 wrote to memory of 4604 3068 u2990778.exe legota.exe PID 3068 wrote to memory of 4604 3068 u2990778.exe legota.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exe"C:\Users\Admin\AppData\Local\Temp\a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1135380.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1135380.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7346986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7346986.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6482031.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6482031.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6596204.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6596204.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 5847⤵
- Program crash
PID:4968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9114316.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9114316.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 5408⤵
- Program crash
PID:1724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1487⤵
- Program crash
PID:2252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0022813.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0022813.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 5846⤵
- Program crash
PID:1148
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6628662.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6628662.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:4280
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4648
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:3088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:3692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3132
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4068
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:1696
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:5100
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2990778.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2990778.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4604 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:2908
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:1812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:1568
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4680
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w9323570.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w9323570.exe2⤵
- Executes dropped EXE
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1816 -ip 18161⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2236 -ip 22361⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2800 -ip 28001⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4720 -ip 47201⤵PID:2304
-
C:\Windows\system32\WerFaultSecure.exe"C:\Windows\system32\WerFaultSecure.exe" -protectedcrash -p 800 -i 800 -h 448 -j 560 -s 576 -d 27561⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1088
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1996
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5c739cf80c84e482ea6279d423c678621
SHA14f88896f5b6b24955e113032c09d83e487a36800
SHA256ecf9be9e52c27c1676bb9f7150d7dfaa7ac8675d0f52e87f74bfde05fb4bffe5
SHA51220efdaffc0cdc6841230b9bf5421093602a3ab4673065c64314348d154ffef1fab8643f3926f67b46b682a37b652aecba2c4b3a2c02b22f83dee8dff13afc8d7
-
Filesize
22KB
MD5c739cf80c84e482ea6279d423c678621
SHA14f88896f5b6b24955e113032c09d83e487a36800
SHA256ecf9be9e52c27c1676bb9f7150d7dfaa7ac8675d0f52e87f74bfde05fb4bffe5
SHA51220efdaffc0cdc6841230b9bf5421093602a3ab4673065c64314348d154ffef1fab8643f3926f67b46b682a37b652aecba2c4b3a2c02b22f83dee8dff13afc8d7
-
Filesize
967KB
MD545b8cd253470fbd34eb6a1d60013dbd5
SHA17a324cc58d8ae70942a5b5e88b2ad5a28dd03662
SHA256c7f8f24e8b713f494c662c44ae2bc4792ea282a2d305a4162046b60700f5788d
SHA51224af94a4afab9571ccc3ac04f6f1acd5a5c939159c6e26d59ac33ce4d9efcddaf256c7ea3e35e14285dd28f999bf585f95a250d6c30799c3644a00e7154bdec7
-
Filesize
967KB
MD545b8cd253470fbd34eb6a1d60013dbd5
SHA17a324cc58d8ae70942a5b5e88b2ad5a28dd03662
SHA256c7f8f24e8b713f494c662c44ae2bc4792ea282a2d305a4162046b60700f5788d
SHA51224af94a4afab9571ccc3ac04f6f1acd5a5c939159c6e26d59ac33ce4d9efcddaf256c7ea3e35e14285dd28f999bf585f95a250d6c30799c3644a00e7154bdec7
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
784KB
MD5612c2deec5666929de5e60077b430fb2
SHA137fc01f6877bc0cd28d1810722bd18fb597e9c40
SHA256e04fc4354a6b3d2bdfa867cfdb7acf736315d6f834641e5c4a79b91fd2028ada
SHA5128757bf92158587b8ba2d2ba7bf867d797d2eca34e388044ae1ceb6ea4ae82f3a261cceb9d798e7c307f88c309c1d5ea3b6b66a803222f14dcd2633a351cc3a3b
-
Filesize
784KB
MD5612c2deec5666929de5e60077b430fb2
SHA137fc01f6877bc0cd28d1810722bd18fb597e9c40
SHA256e04fc4354a6b3d2bdfa867cfdb7acf736315d6f834641e5c4a79b91fd2028ada
SHA5128757bf92158587b8ba2d2ba7bf867d797d2eca34e388044ae1ceb6ea4ae82f3a261cceb9d798e7c307f88c309c1d5ea3b6b66a803222f14dcd2633a351cc3a3b
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
601KB
MD54ec2bb63dc1b80dd358dd5e35a291f98
SHA1427281680c0a984f06de1f9c0ecb4d5c3d8356c6
SHA256fea71d6ecd5126ce097261eacc786a64258fed7c02f75cc8137a588fb299cff9
SHA512cec515bcdb53d3af42ee35cc0f964b92107af2a403dbf731f050c6944a69738139be3a76f1ae9fb79fd12311557a3eaaa24a2f6afdb71b738aa5bb16a52ce3b0
-
Filesize
601KB
MD54ec2bb63dc1b80dd358dd5e35a291f98
SHA1427281680c0a984f06de1f9c0ecb4d5c3d8356c6
SHA256fea71d6ecd5126ce097261eacc786a64258fed7c02f75cc8137a588fb299cff9
SHA512cec515bcdb53d3af42ee35cc0f964b92107af2a403dbf731f050c6944a69738139be3a76f1ae9fb79fd12311557a3eaaa24a2f6afdb71b738aa5bb16a52ce3b0
-
Filesize
380KB
MD50ec0c118bd51553b14079729a15092a1
SHA174960cdd958c3e9a54f1c372a2aab56ae0b6d0a8
SHA2560b8d23101d5552c4556ddb10e69c4b4a7833035a70884649e129b580a6297b89
SHA5121cb4b797239461e88ae9d65f5248f0b06243d558d2f7c8d83cb0d1064c093aa5ef41197bf2bced769c1ceb868b04948b0bc650d526778b4146babad8c8550d26
-
Filesize
380KB
MD50ec0c118bd51553b14079729a15092a1
SHA174960cdd958c3e9a54f1c372a2aab56ae0b6d0a8
SHA2560b8d23101d5552c4556ddb10e69c4b4a7833035a70884649e129b580a6297b89
SHA5121cb4b797239461e88ae9d65f5248f0b06243d558d2f7c8d83cb0d1064c093aa5ef41197bf2bced769c1ceb868b04948b0bc650d526778b4146babad8c8550d26
-
Filesize
338KB
MD5fe9f686d02815088966ef2c44ec1a55f
SHA1f0cd80c6d4b396607992171bcc7e457ecf819825
SHA256b909edc86c8d3da98618b2cb8eef1f19b1bbbc302b42e9e83f1f5f3427aac849
SHA5125d6dac7f0c1f677e51a8fdcfad22350443b74679191076a8938dd6e6ff177a889ace54806708f260000f3e5bb0ec4a7e7af3ce6ccd96943253cb076dcb6a7968
-
Filesize
338KB
MD5fe9f686d02815088966ef2c44ec1a55f
SHA1f0cd80c6d4b396607992171bcc7e457ecf819825
SHA256b909edc86c8d3da98618b2cb8eef1f19b1bbbc302b42e9e83f1f5f3427aac849
SHA5125d6dac7f0c1f677e51a8fdcfad22350443b74679191076a8938dd6e6ff177a889ace54806708f260000f3e5bb0ec4a7e7af3ce6ccd96943253cb076dcb6a7968
-
Filesize
217KB
MD5efb5b818f2ccadb1907ba6b92ffa53f5
SHA1c11e9155dfb5efbfd8c428bf0b0d1f92a3764846
SHA25679a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9
SHA51214188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9
-
Filesize
217KB
MD5efb5b818f2ccadb1907ba6b92ffa53f5
SHA1c11e9155dfb5efbfd8c428bf0b0d1f92a3764846
SHA25679a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9
SHA51214188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9
-
Filesize
346KB
MD5e0d758b569da32a98ee0b0a71b484038
SHA1586b6e1c387d7252306ea2f592106a4237ca94cc
SHA25699537bdd726ee93943fc2e8d66a3381c841b14502fa4600baeb2372a865d8d51
SHA51250f0d33ba0168545fabeb7d556216512efb97899048b037f2992e76939772007974eab6fe489a64d9c610c016ba1ab16d75b27036d8d25daafac210e06a2e051
-
Filesize
346KB
MD5e0d758b569da32a98ee0b0a71b484038
SHA1586b6e1c387d7252306ea2f592106a4237ca94cc
SHA25699537bdd726ee93943fc2e8d66a3381c841b14502fa4600baeb2372a865d8d51
SHA51250f0d33ba0168545fabeb7d556216512efb97899048b037f2992e76939772007974eab6fe489a64d9c610c016ba1ab16d75b27036d8d25daafac210e06a2e051
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0